Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU82941
Risk: Low
CVSSv3.1: 2.7 [CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-5868
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in the aggregate function calls when handling "unknown"-type arguments. A remote user can read parts of system memory.
Update the affected package postgresql13 to the latest version.
Vulnerable software versionsGalera for Ericsson 15: SP5
Legacy Module: 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15: SP2 - SP4
SUSE Linux Enterprise Server 15: SP2 - SP4
SUSE Linux Enterprise Server 15 SP3 LTSS: 15-SP3
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing LTSS 15: SP3
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP3
SUSE Linux Enterprise High Performance Computing 15: SP2 - SP4
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
openSUSE Leap: 15.4 - 15.5
SUSE Enterprise Storage: 7.1
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
postgresql13-docs: before 13.13-150200.5.50.1
postgresql13-plpython-debuginfo: before 13.13-150200.5.50.1
postgresql13-llvmjit: before 13.13-150200.5.50.1
postgresql13-devel-debuginfo: before 13.13-150200.5.50.1
postgresql13-plperl-debuginfo: before 13.13-150200.5.50.1
postgresql13-debugsource: before 13.13-150200.5.50.1
postgresql13-server-devel: before 13.13-150200.5.50.1
postgresql13-devel: before 13.13-150200.5.50.1
postgresql13-pltcl-debuginfo: before 13.13-150200.5.50.1
postgresql13-llvmjit-debuginfo: before 13.13-150200.5.50.1
postgresql13-server-devel-debuginfo: before 13.13-150200.5.50.1
postgresql13: before 13.13-150200.5.50.1
postgresql13-plpython: before 13.13-150200.5.50.1
postgresql13-contrib: before 13.13-150200.5.50.1
postgresql13-server: before 13.13-150200.5.50.1
postgresql13-plperl: before 13.13-150200.5.50.1
postgresql13-debuginfo: before 13.13-150200.5.50.1
postgresql13-test: before 13.13-150200.5.50.1
postgresql13-llvmjit-devel: before 13.13-150200.5.50.1
postgresql13-contrib-debuginfo: before 13.13-150200.5.50.1
postgresql13-server-debuginfo: before 13.13-150200.5.50.1
postgresql13-pltcl: before 13.13-150200.5.50.1
CPE2.3http://www.suse.com/support/update/announcement/2023/suse-su-20234455-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU82942
Risk: High
CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-5869
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote user to execute arbitrary code on the target system.
The vulnerability exists due to integer overflow in array modification. A remote user can pass specially crafted data to the application, trigger an integer overflow and execute arbitrary code on the target system.
MitigationUpdate the affected package postgresql13 to the latest version.
Vulnerable software versionsGalera for Ericsson 15: SP5
Legacy Module: 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15: SP2 - SP4
SUSE Linux Enterprise Server 15: SP2 - SP4
SUSE Linux Enterprise Server 15 SP3 LTSS: 15-SP3
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing LTSS 15: SP3
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP3
SUSE Linux Enterprise High Performance Computing 15: SP2 - SP4
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
openSUSE Leap: 15.4 - 15.5
SUSE Enterprise Storage: 7.1
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
postgresql13-docs: before 13.13-150200.5.50.1
postgresql13-plpython-debuginfo: before 13.13-150200.5.50.1
postgresql13-llvmjit: before 13.13-150200.5.50.1
postgresql13-devel-debuginfo: before 13.13-150200.5.50.1
postgresql13-plperl-debuginfo: before 13.13-150200.5.50.1
postgresql13-debugsource: before 13.13-150200.5.50.1
postgresql13-server-devel: before 13.13-150200.5.50.1
postgresql13-devel: before 13.13-150200.5.50.1
postgresql13-pltcl-debuginfo: before 13.13-150200.5.50.1
postgresql13-llvmjit-debuginfo: before 13.13-150200.5.50.1
postgresql13-server-devel-debuginfo: before 13.13-150200.5.50.1
postgresql13: before 13.13-150200.5.50.1
postgresql13-plpython: before 13.13-150200.5.50.1
postgresql13-contrib: before 13.13-150200.5.50.1
postgresql13-server: before 13.13-150200.5.50.1
postgresql13-plperl: before 13.13-150200.5.50.1
postgresql13-debuginfo: before 13.13-150200.5.50.1
postgresql13-test: before 13.13-150200.5.50.1
postgresql13-llvmjit-devel: before 13.13-150200.5.50.1
postgresql13-contrib-debuginfo: before 13.13-150200.5.50.1
postgresql13-server-debuginfo: before 13.13-150200.5.50.1
postgresql13-pltcl: before 13.13-150200.5.50.1
CPE2.3http://www.suse.com/support/update/announcement/2023/suse-su-20234455-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU82943
Risk: Low
CVSSv3.1: 2 [CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-5870
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to pg_cancel_backend rolse signals background workers, including the logical replication launcher, autovacuum workers and the autovacuum launcher. A remote privileged user can abuse this behavior and perform a denial of service (DoS) attack.
Update the affected package postgresql13 to the latest version.
Vulnerable software versionsGalera for Ericsson 15: SP5
Legacy Module: 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15: SP2 - SP4
SUSE Linux Enterprise Server 15: SP2 - SP4
SUSE Linux Enterprise Server 15 SP3 LTSS: 15-SP3
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing LTSS 15: SP3
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP3
SUSE Linux Enterprise High Performance Computing 15: SP2 - SP4
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
openSUSE Leap: 15.4 - 15.5
SUSE Enterprise Storage: 7.1
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
postgresql13-docs: before 13.13-150200.5.50.1
postgresql13-plpython-debuginfo: before 13.13-150200.5.50.1
postgresql13-llvmjit: before 13.13-150200.5.50.1
postgresql13-devel-debuginfo: before 13.13-150200.5.50.1
postgresql13-plperl-debuginfo: before 13.13-150200.5.50.1
postgresql13-debugsource: before 13.13-150200.5.50.1
postgresql13-server-devel: before 13.13-150200.5.50.1
postgresql13-devel: before 13.13-150200.5.50.1
postgresql13-pltcl-debuginfo: before 13.13-150200.5.50.1
postgresql13-llvmjit-debuginfo: before 13.13-150200.5.50.1
postgresql13-server-devel-debuginfo: before 13.13-150200.5.50.1
postgresql13: before 13.13-150200.5.50.1
postgresql13-plpython: before 13.13-150200.5.50.1
postgresql13-contrib: before 13.13-150200.5.50.1
postgresql13-server: before 13.13-150200.5.50.1
postgresql13-plperl: before 13.13-150200.5.50.1
postgresql13-debuginfo: before 13.13-150200.5.50.1
postgresql13-test: before 13.13-150200.5.50.1
postgresql13-llvmjit-devel: before 13.13-150200.5.50.1
postgresql13-contrib-debuginfo: before 13.13-150200.5.50.1
postgresql13-server-debuginfo: before 13.13-150200.5.50.1
postgresql13-pltcl: before 13.13-150200.5.50.1
CPE2.3http://www.suse.com/support/update/announcement/2023/suse-su-20234455-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.